New & Notable
Evaluate
2025 cloud-native cybersecurity predictions
Join Informa TechTarget's Enterprise Strategy Group analyst Melinda Marks as she looks at what 2025 has in store for cloud-native security.
News
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
Evaluate
Top 7 enterprise cybersecurity challenges in 2025
Security teams faced unprecedented challenges in 2024. The year ahead appears no less daunting. Here are the cybersecurity trends and safeguards to consider in 2025.
News
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
Trending Topics
-
Data Security & Privacy News
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
-
Threats & Vulnerabilities Evaluate
Top 7 enterprise cybersecurity challenges in 2025
Security teams faced unprecedented challenges in 2024. The year ahead appears no less daunting. Here are the cybersecurity trends and safeguards to consider in 2025.
-
IAM Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
Analytics & Automation News
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
-
Network Security Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
-
Operations & Management Manage
Add gamification learning to your pen testing training playbook
Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.
Sponsored Sites
-
Threat Intelligence
Protect Against Malicious Attacks with Increased Threat Intelligence
Learn how Infoblox can help your organization be ready for these threats and prevent data loss and downtime at the same time.
-
Connected Enterprise
Empowering the Truly Connected Enterprise
Learn how Software AG can help your organization become a truly connected enterprise.
-
Cloud Workloads
VMware vSphere Foundation and VMware Cloud Foundation powered by Intel technology results in a unified software-defined Data Center platform for running and managing private cloud, multi-cloud, and edge containerized workloads. Built-in inferencing enables customers to efficiently turn data into insight on a flexible hybrid cloud environment.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
2025 cloud-native cybersecurity predictions
-
Top 7 enterprise cybersecurity challenges in 2025
-
Navigate the 2025 threat landscape with expert insights
-
-
Problem Solve
How to protect against malware as a service
Malware operators are further monetizing their malicious software by selling it to other attackers on a subscription basis. Learn how to detect and mitigate the threat.
-
How to recover from a DDoS attack
-
Biometric privacy and security challenges to know
-
How to identify and prevent insecure output handling
-
-
Manage
Add gamification learning to your pen testing training playbook
Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.
-
7 DevSecOps tools to secure each step of the SDLC
-
How to mitigate wiper malware
-
8 best practices for a bulletproof IAM strategy
-
Information Security Basics
-
Get Started
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data.
-
Get Started
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
-
Get Started
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
Multimedia
-
News
View All -
Data security and privacy
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
-
Data security and privacy
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
-
Data security and privacy
10 of the biggest ransomware attacks in 2024
Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.
Search Security Definitions
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?
- What is passwordless authentication?
- What is PKI (public key infrastructure)?
- What is identity and access management? Guide to IAM
- What is a block cipher?
- What is a stream cipher?